Static task
static1
Behavioral task
behavioral1
Sample
eb7cfe39b59c708fbf4690ad7a74e791_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eb7cfe39b59c708fbf4690ad7a74e791_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eb7cfe39b59c708fbf4690ad7a74e791_JaffaCakes118
-
Size
25KB
-
MD5
eb7cfe39b59c708fbf4690ad7a74e791
-
SHA1
d0d728d86de97b2d1f2b2a59d7fa024f892fe724
-
SHA256
ec51f2174527cbf3ce980d65e46c19ee971537f85d138b30cc789823fe9287e0
-
SHA512
4f2ac50a9e8e84253c97b5fcdbd08dd13692a317e1a512af4286e35065fe45366b685a2000623975f4bfc20728038f70a77890a6fc2a4615c58b2f1b151c731a
-
SSDEEP
384:Rl12gVIeLk5VrTEGStvMzdajzOnDlpaQE7:pZVISk5VrpkiajzWE7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb7cfe39b59c708fbf4690ad7a74e791_JaffaCakes118
Files
-
eb7cfe39b59c708fbf4690ad7a74e791_JaffaCakes118.exe windows:4 windows x86 arch:x86
6cb98ffb388aad78bdd83157d7ed01d6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
shell32
DragAcceptFiles
DragFinish
DragQueryFileW
ShellAboutW
advapi32
IsTextUnicode
RegCloseKey
RegCreateKeyW
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExW
kernel32
CloseHandle
CompareStringW
CreateFileMappingW
CreateFileW
DeleteFileW
FindClose
FindFirstFileW
FoldStringW
FormatMessageW
GetACP
GetCommandLineW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetFileAttributesW
GetFileInformationByHandle
GetLastError
GetLocalTime
GetLocaleInfoW
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetUserDefaultLCID
GetUserDefaultUILanguage
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryA
LocalAlloc
LocalFree
LocalLock
LocalReAlloc
LocalSize
LocalUnlock
MapViewOfFile
MulDiv
MultiByteToWideChar
QueryPerformanceCounter
ReadFile
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
UnmapViewOfFile
WideCharToMultiByte
WriteFile
lstrcatW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
user32
CharLowerW
CharNextW
CharUpperW
CheckMenuItem
ChildWindowFromPoint
CloseClipboard
CreateDialogParamW
CreateWindowExW
DefWindowProcW
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawTextExW
EnableMenuItem
EnableWindow
EndDialog
GetClientRect
GetCursorPos
GetDC
GetDesktopWindow
GetDlgCtrlID
GetDlgItem
GetDlgItemTextW
GetFocus
GetForegroundWindow
GetKeyboardLayout
GetMenu
GetMenuState
GetMessageW
GetParent
GetSubMenu
GetSystemMenu
GetSystemMetrics
GetWindowLongW
GetWindowPlacement
GetWindowTextW
InvalidateRect
IsClipboardFormatAvailable
IsDialogMessageW
IsIconic
LoadAcceleratorsW
LoadCursorW
LoadIconW
LoadImageW
LoadStringW
MessageBeep
MessageBoxW
MoveWindow
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterWindowMessageW
ReleaseDC
ScreenToClient
SendDlgItemMessageW
SendMessageW
SetActiveWindow
SetCursor
SetDlgItemTextW
SetFocus
SetScrollPos
SetWinEventHook
SetWindowLongW
SetWindowPlacement
SetWindowTextW
ShowWindow
TranslateAcceleratorW
TranslateMessage
UnhookWinEvent
UpdateWindow
WinHelpW
wsprintfW
Sections
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ